ACCENTS Transactions on Information Security (TIS) ISSN (P): 12222 ISSN (O): 2455-7196 Vol - 7, Issue - 25, January 2022
  1. 0
    Google Scholar
  2. 0
    Citation
  3. 0
    Impact Factor
Cybersecurity data science and threats: an overview from machine learning perspective

Shivam Priyadarshi and M. Adil Hashmi

Abstract

Cybersecurity has become a significant threat to all operations in the modern world. Due to the continuous development of information and communication (ICT) technologies, the efficiency of machine operation has been improved. Therefore, extracting the pattern of a security incident from the cybersecurity and corresponding data-driven model is the primary element to make an automated security system. To analyse and understand the actual phenomena, different machine learning methods, systems and processes are used. This work also sheds light on how the security system and measures can be improved and maintained by bringing innovation in technology and upgrading the power systems. An example of cybersecurity risks in power systems is the two simultaneous malicious attacks that occurred in 2015 and 2016. Besides, in the IT and healthcare industry, the number of cyberattacks is increasing daily, increasing the cost of data breaches. The distribution of cyberattacks across different countries is discussed in this research. Additionally, issues of cyber physical system (CPS) and its impacts on human society have also been inspected in the work following.

Keyword

Cybersecurity, Cyber physical systems, Machine learning, Information and communication.

Cite this article

Priyadarshi S, Hashmi MA

Refference

[1][1]Sarker IH, Kayes AS, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data. 2020; 7:1-29.

[2][2]Zong S, Ritter A, Mueller G, Wright E. Analyzing the perceived severity of cybersecurity threats reported on social media. arXiv preprint arXiv:1902.10680. 2019:1-11.

[3][3]Bagale GS, Vandadi VR, Singh D, Sharma DK, Garlapati DV, Bommisetti RK, et al. Small and medium-sized enterprises contribution in digital technology. Annals of Operations Research. 2021:1-24.

[4][4]Sadiq A, Anwar M, Butt RA, Masud F, Shahzad MK, Naseem S, Younas M. A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0. Human Behavior and Emerging Technologies. 2021; 3(5):854-64.

[5][5]Neto NN, Madnick S, Paula AM, Borges NM. Developing a global data breach database and the challenges encountered. Journal of Data and Information Quality. 2021; 13(1):1-33.

[6][6]Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics. 2020; 9(1):1-19.

[7][7]Saxena N, Hayes E, Bertino E, Ojo P, Choo KK, Burnap P. Impact and key challenges of insider threats on organizations and critical businesses. Electronics. 2020; 9(9):1-29.

[8][8]https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/. Accessed 10 November 2022.

[9][9]Kurniati E, Sahide A. Paris call as french diplomacy instrument. International Journal of Multicultural and Multireligious Understanding. 2022; 9(8):442-54.

[10][10]Alahmari A, Duncan B. Cybersecurity risk management in small and medium-sized enterprises: a systematic review of recent evidence. In international conference on cyber situational awareness, data analytics and assessment 2020(pp. 1-5). IEEE.

[11][11]Kavallieratos G, Katsikas S. Managing cyber security risks of the cyber-enabled ship. Journal of Marine Science and Engineering. 2020; 8(10):1-19.

[12][12]Yaacoub JP, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M. Cyber-physical systems security: limitations, issues and future trends. Microprocessors and Microsystems. 2020; 77:1-33.

[13][13]Zhang J, Pan L, Han QL, Chen C, Wen S, Xiang Y. Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE/CAA Journal of Automatica Sinica. 2021; 9(3):377-91.

[14][14]Ma C. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports. 2021; 7:7999-8012.

[15][15]Seemma PS, Nandhini S, Sowmiya M. Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering. 2018; 7(11):125-8.

[16][16]Alqahtani H, Sarker IH, Kalim A, Minhaz Hossain SM, Ikhlaq S, et al. Cyber intrusion detection using machine learning classification techniques. In computing science, communication and security: first international conference 2020 (pp. 121-31). Springer Singapore.

[17][17]Soto-Acosta P. COVID-19 pandemic: Shifting digital transformation to a high-speed gear. Information Systems Management. 2020; 37(4):260-6.

[18][18]Lallie HS, Shepherd LA, Nurse JR, Erola A, Epiphaniou G, Maple C, et al. Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security. 2021; 105:1-20.

[19][19]Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Reports. 2021; 7:8176-86.

[20][20]Ahmad A, Desouza KC, Maynard SB, Naseer H, Baskerville RL. How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology. 2020; 71(8):939-53.

[21][21]Sharif MH, Mohammed MA. A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews. 2022; 15(1):138-56.

[22][22]Bubukayr MA, Almaiah MA. Cybersecurity concerns in smart-phones and applications: a survey. In international conference on information technology 2021 (pp. 725-31). IEEE.

[23][23]Bongomin O, Gilibrays Ocen G, Oyondi Nganyi E, Musinguzi A, Omara T. Exponential disruptive technologies and the required skills of industry 4.0. Journal of Engineering. 2020; 2020:1-7.

[24][24]Kettani H, Wainwright P. On the top threats to cyber systems. In 2nd international conference on information and computer technologies 2019 (pp. 175-9). IEEE.

[25][25]Reich J, Schneider D, Sorokos I, Papadopoulos Y, Kelly T, Wei R, et al. Engineering of runtime safety monitors for cyber-physical systems with digital dependability identities. In computer safety, reliability, and security: 39th international conference, 2020 (pp. 3-17). Springer International Publishing.

[26][26]Tantawy A. On the elements of datasets for cyber physical systems security. arXiv preprint arXiv:2208.08255. 2022.

[27][27]Aslan ÖA, Samet R. A comprehensive review on malware detection approaches. IEEE Access. 2020; 8:6249-71.

[28][28]Sarker IH, Furhad MH, Nowrozy R. Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science. 2021; 2:1-8.

[29][29]Ghelani D, Hua TK, Koduru SK. Cyber security threats, vulnerabilities, and security solutions models in banking. Authorea Preprints. 2022.

[30][30]Othman SM, Alsohybe NT, Ba-Alwi FM, Zahary AT. Survey on intrusion detection system types. International Journal of Cyber-Security and Digital Forensics. 2018; 7(4):444-63.

[31][31]Einy S, Oz C, Navaei YD. The anomaly-and signature-based IDS for network security using hybrid inference systems. Mathematical Problems in Engineering. 2021; 2021:1-10.

[32][32]Abdullah TA, Ali W, Malebary S, Ahmed AA. A review of cyber security challenges attacks and solutions for Internet of Things based smart home. IJCSNS International Journal of Computer Science and Network Security. 2019; 19(9):139-46.

[33][33]Al-Alawi AI, Al-Bassam MS. The significance of cybersecurity system in helping managing risk in banking and financial sector. Journal of Xidian University. 2020; 14(7):1523-36.

[34][34]Nieto A, Acien A, Fernandez G. Crowdsourcing analysis in 5G IoT: cybersecurity threats and mitigation. Mobile Networks and Applications. 2019; 24:881-9.

[35][35]Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, et al. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies. 2020; 13(10):1-27.

[36][36]Narayanan SN, Ganesan A, Joshi K, Oates T, Joshi A, Finin T. Early detection of cybersecurity threats using collaborative cognition. In 4th international conference on collaboration and internet computing 2018 (pp. 354-63). IEEE.

[37][37]Altulaihan E, Almaiah MA, Aljughaiman A. Cybersecurity threats, countermeasures and mitigation techniques on the IoT: future research directions. Electronics. 2022; 11(20):1-41.

[38][38]Lee K, Yim K. Cybersecurity threats based on machine learning-based offensive technique for password authentication. Applied Sciences. 2020; 10(4):1-16.

[39][39]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering 2012 (pp. 1-8). IEEE.

[40][40]Dubey AK, Gupta U, Jain S. Computational measure of cancer using data mining and optimization. In sustainable communication networks and application 2020 (pp. 626-32). Springer International Publishing.

[41][41]Dubey A, Gupta U, Jain S. Medical data clustering and classification using TLBO and machine learning algorithms. Computers, Materials and Continua. 2021; 70(3):4523-43.

[42][42]Nemade V, Pathak S, Dubey AK, Barhate D. A review and computational analysis of breast cancer using different machine learning techniques. International Journal of Emerging Technology and Advanced Engineering. 2022; 12(3):111-8.

[43][43]Chahar R, Dubey AK, Narang SK. A review and meta-analysis of machine intelligence approaches for mental health issues and depression detection. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(83):1279-314.

[44][44]Patil SS, Patidar K, Saxena G, Sharma N. An improve image security algorithm using hybrid cryptography approach. ACCENTS Transactions on Information Security. 2021; 6 (23):13-9.

[45][45]Shrivastava A, Dubey AK. An efficient hybrid encryption approach with bit shuffling for image data security. ACCENTS Transactions on Information Security. 2021; 6(24):20-25.